Tuesday, January 21, 2025
Homecyber securityFog Ransomware Now Targeting the Financial Sector; Adlumin Thwarts Attack

Fog Ransomware Now Targeting the Financial Sector; Adlumin Thwarts Attack

Published on

SIEM as a Service

Follow Us on Google News

The Fog Ransomware group, known for targeting education and recreation sectors, has expanded its scope to attack financial services organizations, where the attackers exploited compromised VPN credentials to deploy the ransomware, targeting both Windows and Linux endpoints. 

It has detected the ransomware activity and isolated the affected machines, preventing data encryption and theft.

While the attack originated from IP addresses in Russia, this alone cannot definitively attribute the attack to a specific geographic location due to potential masking techniques.

The Fog ransomware, a variant of STOP/DJVU, exploits compromised VPN credentials to infiltrate networks, primarily targeting education and recreation sectors.

After gaining administrative access, it disables security measures, encrypts VMDKs, and deletes backups, leaving victims with limited options. 

The ransomware, marked with extensions like ‘.FOG’ or ‘.FLOCKED’, demands a ransom via a Tor network platform.

Unlike traditional APT groups, Fog’s origin remains unattributed, suggesting a new, highly skilled threat actor.

The attackers began their network exploration by sending ping requests to various network devices and saving the results in text files named ‘pings.txt’ and ‘pingw.txt’. 

Using elevated privileges obtained from compromised service accounts, they then employed the ‘Advanced_Port_Scanner_2.5.3869(1).exe’ tool to scan network hosts for open ports and gather detailed information about their services, which allowed them to identify potential vulnerabilities and entry points into the network.

The Adlumin team discovered that a Russian IP address had compromised an unprotected system, initiating the attack, where the attackers exploited compromised service accounts and domain trust relationships to traverse the network. 

They executed the ‘nltest /domain_trusts’ command to gather information about domain trust relationships. Subsequently, they employed the ‘SharpShares.exe’ binary to map network drives and share folders on other devices, facilitating further lateral movement within the network.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

The attacker used the `esentutl.exe` command-line tool to create a backup of login data stored in the Google Chrome user profile folder, which included encrypted credentials for various websites. 

The backup was saved to a temporary file in the same directory, allowing the attacker to potentially extract the credentials later using decryption techniques.

Indicator of Compromise
Indicator of Compromise

The attacker leveraged Rclone, a file transfer tool, to selectively sync recently modified data (excluding specific file types) from compromised systems. 

Next, they executed “locker.exe” with the “-id” switch, likely containing a unique identifier for the attack, where the “-target” switch specified a network share for data exfiltration. 

Finally, the attackers deployed WMIC and PowerShell commands to eliminate shadow copies, hindering file recovery from backups, which demonstrates a multi-pronged approach, combining data theft with encryption to pressure victims into paying the ransom. 

The security team identified and isolated endpoints compromised by a Fog ransomware attack and found malicious binaries and vulnerable endpoints that allowed unauthorized access. 

To mitigate risks, it has been recommended to implement MFA, update VPN software, monitor VPN access, automate endpoint isolation, use a comprehensive security platform, disable unnecessary services, regularly back up data, applying the principle of least privilege, conducting security audits, establishing incident response plans, and monitoring network traffic. 

What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

PoC Exploit Released for TP-Link Code Execution Vulnerability(CVE-2024-54887)

A security researcher, exploring reverse engineering and exploit development, has successfully identified a critical...

Brave Browser Vulnerability Allows Malicious Website Appears as Trusted One

A security vulnerability has been identified in Brave Browser, potentially allowing malicious websites to...

Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

A recent phishing campaign has targeted customers of SBI Bank through a deceptive message...

Gootloader Malware Employs Blackhat SEO Techniques To Attack Victims

The Gootloader malware family employs sophisticated social engineering tactics to infiltrate computers.By leveraging...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

PoC Exploit Released for TP-Link Code Execution Vulnerability(CVE-2024-54887)

A security researcher, exploring reverse engineering and exploit development, has successfully identified a critical...

Brave Browser Vulnerability Allows Malicious Website Appears as Trusted One

A security vulnerability has been identified in Brave Browser, potentially allowing malicious websites to...

Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

A recent phishing campaign has targeted customers of SBI Bank through a deceptive message...